Project Management
Project Management Professional (PMP)
The exam of this certification assess the knowledge of PMBoK (Project Management Book of Knowledge).
Owned by PMI (Project Management Institution)
PRINCE2
PRINCE2 stands for PRojects IN Controlled Environments.
Owned by AXELOS.
IPMA
IPMA stands for International Project Management Association
CAPM
Certified Associate in Project Management
Issued by PMP
Entry-level certification
It expires after 5 years, then it can be retaken.
Software Development Paradigms and Models
Agile
Agile is a family of methodologies.
Scrum and Kanban are derived from Agile.
Different institutions grant certificates about Agile, for example:
- SAFe 5 Agilist, issued by Scaled Agiled Inc
Software Development Methodologies and Frameworks
Kanban
Based on Agile.
Owned by Toyota.
Scrum
Process framework for agile software development.
DevOps
Newer than Scrum.
IT Security
Probably the most valued of this list are CISSP and CISM.
SSCP
Issued by (ISC)2.
In the PECB ISO/IEC 27001 Lead Implementer course notes, it describes “SSCP” as “for new graduates”.
CISSP
Certified Information Systems Security Professional
Issued by (ISC)²
Requires 5 years of experience.
Official link
In the PECB ISO/IEC 27001 Lead Implementer course notes, it describes “CISSP” as “for experienced professionals in information security”.
CISM
Certification in Information Security Manager
Issued by ISACA
Candidate needs both to pass an exam and prove previous experience on the topic to get the certificate.
Official link
In the PECB ISO/IEC 27001 Lead Implementer course notes, it describes “CISSP” as “for experienced professionals in information security”.
CEH
Certified Ethical Hacker
Issued by EC-Council.
https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/
CSX-F
Cybersecurity Nexus Fundamentals Certificate
Issued by ISACA
It is just an exam, candidate does not need to prove previous experience to get the certificate.
For new graduates.
CSX-P
Cybersecurity Nexus Practitioner Certification
Issued by ISACA
Candidate needs both to pass an exam and prove previous experience on the topic to get the certificate.
Official link
Security+
Issued by CompTIA
Official link
In the PECB ISO/IEC 27001 Lead Implementer course notes, it describes “Security+” as “for new graduates”.
OSCP / PEN-200
Offensive Security Certified PWK
Issued by Offensive Security
PWK is the Offensive Security’s flagship Ethical Hacking course. It woudl be similar to CEH, but harder.
GICSP
Global Industrial Cyber Security Professional
Issued by GIAC.
IT Cloud Security
CCSK
Certificate in Cloud Security Knowledge
Issued by Cloud Security Alliance (CSA).
https://cloudsecurityalliance.org/education/ccsk/
CCSP
Cloud Computing Security Professional
Issued by (ISC)2
https://www.isc2.org/Certifications/CCSP
IT Audit
CISA
Certified Information System Auditor
Issued by ISACA
Candidate needs both to pass an exam and prove previous experience on the topic to get the certificate.
In the PECB ISO/IEC 27001 Lead Implementer course notes, it describes “CISSP” as “for experienced professionals in information security”.
Cybersecurity Audit
Issued by ISACA
Official link
CIA
Certified Internal Auditor
IT Security Framework Implementer
See more on post “IT Security Frameworks“.
ISO 27001 Lead Implementer
Read internal post “ISO/IEC 27001 Lead Implementer Certifications“.
Certified NIST Cybersecurity Framework Lead Implementer
Enterprise Information Security Architecture
Zachman Certified
https://www.zachman.com/courses
Zachman framework course.
CISSP-ISSAP
CISSP-ISSAP (Information Systems Security Architecture Professional) is a specialization of CISSP.
Specific to security.
Read more on this post.
GEIT / IT Governance Framework
GEIT means Governance of Enterprise IT.
ITIL
Formerly an acronym for Information Technology Infrastructure Library.
Owned by AXELOS.
Service Management Framework
The implementation of ITIL processes facilitates the implementation of controls for ISO/IEC 27002.
CMMI
CMMI stands for Capability Maturity Model Integration.
There was also a CMM (Capability Maturity Model), but it was largely supersed by CMMI. The major difference between these two is that CMM focuses on isolated processes, whereas CMMi focuses on the integration among those processes.
CMMI establish 5 maturity stages on processes:
- Initial
- Managed (“repeatble” in CMM)
- Defined
- Quantitatively managed (“managed” in CMM)
- Optimized
CMMI is used on GAP analysis, to identify the current state and the objective state.
The implementation of CMMI processes facilitates the implementation of controls for ISO/IEC 27002.
There are various certification levels for CMMI practitioners:
https://cmmiinstitute.com/learning/certifications
There is a CMMC, for Cybersercuty Capability Maturity Model.
COBIT 5
Owned by ISACA.
IT Management and Governance Framework.
In addition to the framework, ISACA issue some certificate related to it. As certificates, they are for life.
COBIT approach to risk management can help to implement ISO/IEC 27001.
CGEIT
Issued by ISACA.
Certified in Governance of Enterprise IT.
It is not a framework, and it is exclusively a certification. As a certification, it needs to be maintained under the CPE program.
IT Risk Management
CRISC
Certified in Risk and Information Systems Control
Issued by Isaca.
CRMA
Certification in Risk Management Assurance
ISO/IEC 2005 Certified Risk Manager
ISO/IEC 2005 Certified Risk Manager
IT Management Practices
Lean IT
Developed by Toyota.
Owned by LeanIT Association.
Six Sigma
Owned by the Six Sigma Council.
Service Desk Certification
Owned by SDI (Service Desk Institute)
IT Networks
CCNA
Cisco Computer Networks Associate
Associate or entry-level Cisco networks certificate.
CCNP
Cisco Computer Networks Professional
Professional-level Cisco networks certificate.
Not yet classified
GIC
Global Information Assurance Certification
CPA
Certified Public Accountant
CIPM
Certified Information Privacy Manager
CFE
Certified Fraud Examiner
No comments yet.